About your Search

20130419
20130419
Search Results 0 to 2 of about 3
of their own people and continue to develop technology it is a matter of time before they have technology to reach us. do you agree with that? >> probably so. if they keep working at it and they have a single-minded focus focus, particularly the current leader may be more intensely than his father i think feels that is the key to their survival. >> i think that is a good honest assessment put them in the bucket of threats that the nation faces a capable of north korea with larger missiles and probably smaller bombs producing that is a reasonable threat we should plan against if nothing changes? >> i do blie that. >> syria. to give enough chemical weapons to kill thousands? >> potentially yes and that is very dependent on lots of things are the number of casualties that could be incurred in favor employee. >> but they have a lot that could killltofpele >> correct. that's another step. over the last six months as we are imposing sanctions and negotiating through the regime do they have more or less enriched uranium? >> we will get you the exact numbers enclosed context. >> can i say it is m
analysts are doing right now backed in their headquarters. they're using very cutting edge technological tools to mine any of the data that they are able to pull from the first suspect who was killed early this morning. so his travel records, phone records, anything that they could look at, social security number to figure out who might be in the ever-expanding circle of people who knew him. these cutting edge tools would also look on the internet. did these individuals and this is a new thing that happened post-9/11 is that when you are confronted with a potential terrorism threat and knew the individual the first thing you did was go to social media, check on facebook, check on, you know, twitter. >> speak of twitter, the boston police department just tweeted an hour ago, an alert to the media not to disclose the tactical information to compromise officer safety with the homes that are being searched. there are a lot of crews up in boston and a lot of people covering this and a lot of risks in there. >> with the fact that the individuals had ieds with them overnight and were throwing t
of this implementation was really to create information and technology exchanges in every part of the country. and they are focusing most specifically on critical access, hospitals and on small providers. knowing that the l to have a big i.t. department or have people who could implement this in a sfiio of time were not there. so in every state there are individuals who are sort of, i compared them to the farm extension services, folks were on the ground literally, office to office, hospital to hospital, spend time on how to convert what the best strategies are, how did engaged and involved. and we found at least in a state like kansas, which is not terribly different from the challenges i think that you see in your state, that that strategy has been enormously effective. and small providers are engaged and enrolled with those extensions operations, and find them to be kind of their service team on the ground. >> the only thing i would say, i hope that as we move forward with this, that the focus really will be on issue of interoperability we've asked questions numerous time of the committee
Search Results 0 to 2 of about 3